Business Software for Ping Identity - Page 5

Top Software that integrates with Ping Identity as of July 2025 - Page 5

  • 1
    DataGuard

    DataGuard

    DataGuard

    Achieve your security and compliance goals with DataGuard’s all-in-one platform, designed to simplify compliance with frameworks like ISO 27001, TISAX®, NIS2, SOC 2, GDPR, and the EU Whistleblowing Directive. DataGuard’s iterative risk management enables you to capture all relevant risks, assets and controls to reduce risk exposure from day one. Automated evidence collection and control monitoring ensure ongoing governance to safeguard your organization as it scales. The platform combines AI-powered automation with expert support, reducing manual effort by 40% and fast-tracking certification by 75%. Join 4,000+ companies driving their security and compliance objectives with DataGuard. Disclaimer: TISAX® is a registered trademark of the ENX Association. DataGuard is not affiliated with the ENX Association. We provide Software-as-a-Service and support for the assessment on TISAX® only. The ENX Association does not take any responsibility for any content shown on DataGuard's website
  • 2
    Britive

    Britive

    Britive

    Permanent elevated privileges leave you open to increased data loss & account damage due to insider threats & hackers 24/7. Temporarily granting & expiring Just In Time Privileges with Britive instead minimizes the potential blast radius of your privileged human and machine identities. Maintain zero standing privileges (ZSP) across your cloud services, without the hassle of building a DIY cloud PAM solution. Hardcoded API keys and credentials, typically with elevated privileges, are sitting targets for exploits, and there are 20x more machine IDs using them than there are human users. Granting & revoking Just-in-Time (JIT) secrets with Britive can significantly reduce your credential exposure. Eliminate static secrets & maintain zero standing privileges (ZSP) for machine IDs. Most cloud accounts become over-privileged over time. Contractors & employees often maintain access after they leave.
  • 3
    BeyondTrust Cloud Privilege Broker
    Cloud Privilege Broker gives your team the tools to visualize and manage entitlements across the multi-cloud infrastructure. Cloud-agnostic, centralized dashboard with key metrics. Continuous discovery of users, roles, policies, and endpoints across all supported cloud platforms. Granular policy recommendations across IaaS and PaaS platforms from a single interface. BeyondTrust Cloud Privilege Broker (CPB) is an entitlements and permissions management solution that enables customers to visualize and manage cloud access risk in hybrid and multi-cloud environments, all from a single interface. Each cloud service provider has its own access management tools, but they only manage their own environments and do not scale to cover others. This leaves teams to swivel from console to console, attempting to manage permissions separately for each cloud provider, with different ways to apply policy from one platform to the next.
  • 4
    Swiftly

    Swiftly

    Swiftly

    Enrich your loyalty program through robust customer data and modernized personalization that drives more rewards for everyone. Ready to see what happens when you have the digital tools and systems retail giants depend on? Our next-level technology solutions even the playing field, connecting you with your customers and increasing your bottom line. Whether they’re browsing the store, picking up at the curb, or looking for home delivery, give your customers the option to shop on their time, their way, anytime. Our data-rich and machine-learning solutions we provide a snapshot into individual customer behavior, giving you the data you need to build personalized connections and lifetime loyalty and value. Using 1st-party data and deep insights, we identify content that speaks to customers individually, allowing you to target and engage them along every step of their retail journey. Create loyalty and drive engagement with customers by offering recommendations, offers and incentives.
  • 5
    Procyon

    Procyon

    Procyon

    Get frictionless, secure access to cloud infrastructure. Get passwordless access to major cloud platforms and thousands of cloud resources. We work seamlessly with AWS, GCP, Azure, and other cloud-native tools. Stop overprivileged access with just-in-time access for developers. DevOps users can request access to cloud resources with ‘just enough privileges’ to get timebound access to resources. Eliminate productivity bottlenecks of a centralized administrator. Configure approval policies based on a variety of factors. View a catalog of granted and unaccessed resources. Stop credential sprawl and worrying about credential theft. Developers can get passwordless access to cloud resources using Trusted Platform Module (TPM) based technology. Discover potential vulnerabilities now with our free assessment tool and understand how Procyon can help solve the problem in a matter of hours. Leverage TPM to strongly identify users and devices.
  • 6
    ValidSoft

    ValidSoft

    ValidSoft

    Pretty much anything we do online now requires passwords and security questions. It’s a part of life, really. Keeping track of all this information is frustrating. All of it is meant to protect us, ensuring we are the only ones who can access our accounts and data. Granted we are always hearing news of breaches that circumvent our passwords, but we want fast, easy-to-use login authentication that delivers a better end-user experience and saves on operational costs. We believe voice is the leading authentication factor that will improve your lives. You deliver a simple, quick, secure, password-free login experience for your customers. You significantly reduce password management costs. You achieve compliance with biometric privacy laws. A real-time comparison of an individual’s voice to their unique voiceprint validates the claimed identity. Make sure people are who they say they are. Use one model across many channels for true omnichannel excellence.
  • 7
    RxPulse Software

    RxPulse Software

    Pharmaceutical Data Services

    RxPulse software is an indispensable tool for pharmaceutical sales reps and managers looking to streamline their business leads and accelerate growth. With RxPulse, your sales team can easily access a wealth of critical data and analytics to improve their sales processes and stay ahead of the competition. RxPulse’s customizable dashboard provides a comprehensive view of vital metrics such as prescriber information, sales history, competitor products, call activity, incentive compensation details, and more. Our platform is built to your specifications, and we offer pre-bucketed query fields to help you quickly find the information you need. PDS takes your client-provided data and transforms it into a user-friendly format such as graphs, charts, tables, etc., enabling your sales team to gain valuable insights and make informed decisions. With unlimited functionalities and robust tools, RxPulse software empowers your team to answer any question and build any report.
  • 8
    Sana

    Sana

    Sana Labs

    One home for all your learning and knowledge. Sana is an AI-powered learning platform that empowers teams to find, share, and harness the knowledge they need to achieve their missions. Give everyone a more immersive learning experience by blending live collaborative sessions with personalized self-paced courses. All from one platform. Lower the barrier to sharing knowledge by letting Sana Assistant generate questions, explanations, images, and even entire courses from scratch. Empower anyone to keep up the energy and engagement with interactive quizzes, Q&A, polls, stickynotes, reflection cards, recordings, and more. Integrate Sana with all your team apps and make your entire company’s knowledge searchable in under 100ms. Github, Google Workspace, Notion, Slack, Salesforce. You name it, Sana can query it.
  • 9
    Modo

    Modo

    Modo Labs

    Building a custom app shouldn’t take months or years to launch. It shouldn’t require software developers to create. And it shouldn’t need vast IT resources to maintain. Introducing the Modo Platform. A digital engagement platform that simplifies how companies and campuses create, scale, and evolve a branded digital experience. Designed to accelerate app development, Modo’s development platform enables everyone from the executive team to front-end developers to get involved. Curate, manage, and update your app without one line of code. Invite subject matter experts to create and deploy content. Choose from an extensive collection of unique screen types and building blocks in limitless combinations to create a highly tailored app. No need for complicated or lengthy rollouts. Deploy once and update instantly across all systems and devices.
  • 10
    Hive Perform

    Hive Perform

    Hive Learning

    Accelerate skill acquisition, increase productivity, and drive ROI by equipping your team with the right skills at the right time. Delivers business-relevant content tailored to your specific sales methodologies, ensuring new hires receive the most pertinent information. Provides scenario-based practice, allowing sales reps to practice in realistic settings, making their training permanent. Offers instant access to knowledge, so new reps can quickly find answers and resources as they need them. Centralizes all processes, policies, and tools in one accessible location, ensuring consistency and ease of use. Provides instant access to process updates, policy changes, and tool information, keeping reps informed and efficient. Delivers ongoing, scenario-based practice opportunities, ensuring skills are continuously honed and retained. Provides continuous access to relevant knowledge and resources, keeping skills sharp and engagement high.
  • 11
    MediaGuard
    We help you fight fraud and protect the brands you serve by ensuring quality ad inventory reaches real humans across all channels and formats. Using superior detection techniques, hacker intelligence, and collective protection across the internet, HUMAN detects and defeats bot attacks and fraud with unmatched scale, speed, and precision. By leveraging actionable insights that only HUMAN can provide, we can assure you that only real humans will interact with your digital advertising. Safeguard your customers, revenue, and operational efficiency across all of your environments by enforcement actions that keep unwanted bots at bay. Keep your digital advertising efforts free from fraud by protecting your platforms from sophisticated bots. Reduce inefficiencies and operating costs associated with fending off fraud by keeping your platform's ad inventory clean from the start. Protect existing revenue from demand partners while attracting new revenue.
  • 12
    Orchid Security

    Orchid Security

    Orchid Security

    Orchid Security utilizes a passive listening service to continuously discover self-hosted applications (those that you manage/maintain) and SaaS applications (developed and maintained by others), providing you with a comprehensive inventory of your enterprise applications, along with their key identity characteristics (e.g. MFA enforcement, rogue or orphaned accounts, RBAC privilege data). Orchid Security leverages advanced AI analytics to automatically assess the identity technologies, protocols, and native authentication/ authorization flows for each application. Identity controls are compared against privacy regulations, cyber security frameworks, and identity best practices (e.g. PCI DSS, HIPAA, SOX, GDPR, CMMC, NIST CSF, ISO 27001, SOC2) to detect potential exposure in cyber security posture and compliance coverage. Orchid Security goes beyond providing visibility into weaknesses, to enable organizations with quick and effective remediation of those weaknesses without recoding.
  • 13
    Token

    Token

    Token

    Token Security introduces a new approach designed for the Non-Human Identity (NHI) boom era, focusing on machine-first identity security. Identities are everywhere and left unmanaged; they’re machines, apps, services, and workloads created by everyone, popping up all day, every day. The complex and slow process of managing these identities has created an attack surface organizations are simply not prepared to deal with. Instead of focusing on a list of human identities, Token focuses on the resources being accessed first, instantly uncovering who is accessing what, where you are at risk, and how to stay secure. Without interrupting production or business continuity. Token discovers all identities across all locations in your cloud, even breaking down complex mechanisms like Kubernetes, databases, servers, and containers, stitching together all relevant identity data into a single unified view.
  • 14
    Espressive Barista
    Espressive's Barista Agent Co-Pilot is an AI-powered solution designed to enhance service desk operations by integrating seamlessly with existing systems such as ServiceNow, CXone, AWS Connect, and Genesys. It offers features like New Ticket Enrichment, which uses AI to predict ticket attributes and retrieve relevant knowledge, and Barista Live Translation, enabling agents to communicate effectively across different languages. Agents can access BaristaGPT directly within tickets or chats, providing immediate assistance and automation capabilities. The platform also includes Automatic Knowledge Generation, creating new knowledge articles from resolved tickets to improve future issue resolution. By reducing mean time to resolution (MTTR), increasing first call resolution, and minimizing escalations, Barista Agent Co-Pilot enhances agent productivity and shortens the onboarding period for new agents.
  • 15
    Akitra Andromeda
    ​Akitra Andromeda is a next-generation, AI-enabled compliance automation platform designed to streamline and simplify regulatory adherence for businesses of all sizes. It supports a wide range of compliance frameworks, including SOC 2, ISO 27001, HIPAA, PCI DSS, SOC 1, GDPR, NIST 800-53, and custom frameworks, enabling organizations to achieve continuous compliance efficiently. The platform offers over 240 integrations with major cloud platforms and SaaS services, facilitating seamless incorporation into existing workflows. Akitra's automation capabilities reduce the time and cost associated with manual compliance management by automating monitoring and evidence-gathering processes. The platform provides a comprehensive template library for policies and controls, assisting organizations in establishing a complete compliance program. Continuous monitoring ensures that assets remain secure and compliant around the clock.
  • 16
    Fexa

    Fexa

    Fexa

    Fexa is a modern computerized maintenance management system designed for multi-location businesses, simplifying complex operations and ensuring seamless coordination between staff, service providers, and management teams. It offers automated work order management, configurable workflows, real-time data and analytics, mobile access for field technicians, provider management tools, budget planning, and integration with tools like ERP and accounting systems. Fexa's facility management software streamlines operations, adapts to change, and boosts performance across all locations. It empowers facilities management teams to do superhuman amounts of work using an easy-to-understand tool that integrates with everything and automates complex workflows by design. Fexa allows you to dictate your workflow based on your unique business challenges, proactively solving problems you don't know you have.
  • 17
    AWS IAM Identity Center
    AWS IAM Identity Center simplifies centralized access management across multiple AWS accounts and business applications. It enables users to access assigned accounts and applications from a unified portal. Administrators can manage user permissions centrally, assigning them based on job functions and customizing as needed. IAM Identity Center integrates with various identity sources, including Microsoft Active Directory, Okta, Ping Identity, JumpCloud, and Microsoft Entra ID, and supports standards like SAML 2.0 and SCIM for user provisioning. It facilitates attribute-based access control by allowing selection of user attributes such as cost center, title, or locale from the identity source. It supports multi-factor authentication (MFA) using methods like FIDO-enabled security keys, biometric authenticators, and time-based one-time passwords.
  • 18
    Rally Software
    Rally is an enterprise-class platform that’s purpose-built for scaling agile development practices. Power your organization with enterprise agility. In order to make faster and smarter decisions, your development work needs to align to your company's most important business objectives. Align daily work to strategy and leverage data to steer your business towards an outcomes-oriented culture. Rally serves as a central hub for teams to collaboratively plan, prioritize and track work on a synchronized cadence. Teams can visualize their work in the form of lists, boards or timeline views, and more importantly—they can understand how their day-to-day work aligns to the greater goals of the business. Do you struggle to manage dependencies and risks across multiple teams or delivery groups? Rally provides comprehensive roll-ups of progress, dependencies, alignment and plan health—so teams and groups can make intentional decisions and stay ruthlessly focused on value.
  • 19
    Ombud

    Ombud

    Ombud

    Built on a foundation of expertise in sales engineering and response management, Ombud serves enterprise-level RevOps teams. We move beyond basic automation and knowledge management, offering context-aware intelligent support. This enables RevOps teams to significantly elevate efficiency, cut costs, and surpass growth goals. Ombuddies are AI-enabled, context-aware assistants designed to support various roles within Revenue Operations. They automate routine tasks and provide real-time, role-specific guidance, significantly boosting productivity and reducing costs. The Response Management Ombuddy is your AI companion to help with the heavy lifting of creating, reviewing, and submitting proposals and responses.
  • 20
    A10 Defend DDoS Mitigator
    A10 Defend DDoS Mitigator (formerly Thunder TPS) is a scalable and automated DDoS protection solution powered by advanced machine learning, leading the industry in precision, scalability, and performance. The solution minimizes downtime with multi-vector DDoS mitigation, leveraging FPGA-based acceleration and various clustering techniques to provide protection at scale. Auto policy escalation, intelligent zero-day mitigation, and streamlined SecOps elevates efficacy while lowering TCO.
  • 21
    SecureIdentity MFA
    The simple ‘username and password’ approach alone is not strong enough to protect your business’ critical data. Log-ins can be compromised within minutes, making your private data vulnerable to threat. Our SecureIdentity platform provides the identity of the user, the device and the data they are working on, so you can prove exactly who is doing what at any time. MFA is best practice for layered data and privacy security. Our MFA solution integrates seamlessly with Microsoft’s Active Directory and other LDAP solutions, allowing you to reutilize your existing authentication database infrastructure, avoiding the need to re-architect, deploy, backup and manage a secondary user database. We believe users should be able to choose any personal device to be their authentication token, whether it is their mobile phone, tablet, laptop or even their desk phone.
  • 22
    Datacard Secura
    Datacard® Secura™ identity and credential management software revolutionizes the issuance and post-issuance management of highly-secure passports, national IDs, PIV cards, and other secure government credentials. It streamlines every step of the process, including enrollment, identity verification, application approval, document issuance, and post issuance management. Offers from high-volume, desktop, and mobile issuance options. Allows for updates, revocation, and other post-issuance processes. Instead of custom development, leverage preconfigured workflows for faster deployment. Enables biometric and biographic capture, breeder document processing. Interfaces with external sources to verify and manage identities. Includes business rules, profiles, and data preparation capabilities. A greatly reduced need for customization miimizes the risk of cost and time overruns. A standards-based architecture streamlines integration with other elements of your credential ecosystem.
  • 23
    Eclypsium

    Eclypsium

    Eclypsium

    Eclypsium® ensures the health and integrity of enterprise devices at the fundamental firmware and hardware layers that traditional security fails to protect. Eclypsium provides a new layer of security to defend the critical servers, networking gear, and laptops at the heart of every organization. Unlike traditional security that only protects the software layers of a device, Eclypsium brings security to the hardware and firmware. From the earliest boot process to the most fundamental code on a device, Eclypsium finds and fixes the low-level weaknesses and threats that attackers use to defeat traditional security. Get high-fidelity views into all enterprise devices including servers, networking gear, and laptops. Automatically find vulnerabilities and threats in all hardware and firmware components inside each device. See into devices both on-premises or deployed remotely including remote work and BYOD devices.
  • 24
    Cloudbooking

    Cloudbooking

    Cloudbooking

    Manage workspace with confidence, ensure employee well-being, optimize your workplace real estate, and work smarter with Cloudbooking’s workspace management software. Book a no-obligation demo today and get an exclusive hybrid working research paper, for free, created in partnership with YouGov. Our cloud-based workplace reservation system has transformed more than a few businesses over the years. Cloudbooking promises a fast-paced and dynamic response to the demands of the evolving modern workplace. Trust that you can always make the right business decisions about your people and real estate by empowering live data and insights available instantly. Whether you’re managing a safe return to the workplace, consolidating your real estate due to new ways of working or improving employee connectivity during your remote working strategy, whatever challenges come next, Cloudbooking is always here to help.
  • 25
    Slice

    Slice

    Slice

    Both the company and the employees are exposed to legal and financial risks. Many factors are in play that make today’s process challenging and complicated. Each country has specific regulations around equity which constantly change. It exposes you and your employees to financial penalties. Tax codes for equity are extremely complicated. Mistakes are irreversible and it’s easy to miss on large tax breaks. Setting up and maintaining global equity plans is heavily time-consuming. It requires deep and expensive research. It’s hard to follow what's happening, takes a lot of time and mistakes happen. Stay compliant worldwide and avoid problems altogether with preemptive alerts that steer you clear of any potential exposure issues.
  • 26
    Ivanti Docs@Work
    The Ivanti Docs@Work app gives end users an intuitive way to access, annotate, handle multiple shared files, and view documents from email, SharePoint, Office 365, Dropbox, and a variety of other on-premises and cloud repositories. Enterprise productivity depends almost entirely on having reliable access to content of all types, from customer accounts to healthcare records to financial transactions. With Ivanti Docs@Work, your IT admins can enforce data loss prevention (DLP) controls to prevent unauthorized distribution while allowing users to effortlessly download, edit, and share multiple documents from their mobile devices—without compromising corporate data.